Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Resilient Cybersecurity
Resilient Cybersecurity

Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

eBook
£20.98 £29.99
Paperback
£37.99
Subscription
Free Trial
Renews at £16.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Resilient Cybersecurity

Setting the Foundations

As discussed in the previous chapter, we now understand the current state, which isn’t good, and we have a lot of work ahead of us to build or reconstruct our cyber-resilient strategy. Before getting started on this journey, it’s important to lay the foundation of what the strategy for your program will look like. To do this, we will cover some very important subjects that will help you better set the foundations to allow greater success for your broader cybersecurity program.

As a cybersecurity leader, it’s never been more important to integrate yourself with the broader organization. This means you need to learn the business inside out and build relationships throughout, including the top levels. In your role as a leader, you will need to build positive relationships within every function of your organization including the C-suite. Without these relationships, your success will become an uphill battle. Although you don’t need...

Learn the Business

The role of a cybersecurity leader within an organization has significantly changed and grown in a short amount of time. The cybersecurity function is no longer a standalone function that has traditionally operated in silo from the rest of the organization. The role of cybersecurity within the organization touches every aspect of your business and is one that requires new evolving qualities. A cybersecurity leader has traditionally been thought of as a technical type of leader, but this role has shifted to become more of a business acumen that can represent risk at the broader organization level. The need to translate and relate technical skills still holds incredible value at this level. Having both these qualities is becoming a requirement for this role. Because of the importance of cybersecurity, we are seeing a significant increase in the need for C-level representation at the executive and boardroom levels, and this role as we know it today is the Chief Information...

What about Finances?

Everyone’s favorite topic: managing the budget. As you continue to grow your career into management and leadership, you will find the responsibility of financial management continues to become a larger responsibility. The reality is that everything about an organization revolves around the bottom line, otherwise known as the income. If there is no money available, a company simply cannot operate. Part of your role as a cybersecurity leader plays into the larger organization as it relates to finances. You will need to manage a set budget, you will continuously be challenged against that budget, and you will always be asked for ways to cut your budget. It is important that you manage finances efficiently and always be one step ahead when needing to justify the need to retain and potentially increase your budget needs.

Whether your organization is public, nonprofit, or private, you will need to understand financial management at the broader organization...

Building Blocks for Your Cybersecurity Program

To provide additional visibility into how your cybersecurity program looks and what is involved, you will need to provide some form of representation of the program. Within this representation, you will want to highlight the specific functions needed to run your cybersecurity program. This can be done in many ways and may differ per organization and different industries you are in, but having this in place helps provide your leadership teams and the broader organization with better insight into how the cybersecurity program is being executed and operates on a day-to-day basis.

As we work through this book, we will follow the premise of ten core functions that I believe every organization will foundationally need as the building blocks for their cybersecurity program. These core functions are:

  • Cybersecurity architecture
  • Identity and access management
  • Cybersecurity operations
  • Cybersecurity awareness, training...

Defining the Cybersecurity Organization

Before going into more detail on the organization’s structure, roles, and responsibilities, it is important that you spend some time creating a mission and vision for the cybersecurity organization. As we previously discussed, there will be (or should be) a mission and vision at the organization level and there is a high probability that other functions/units within the organization have their own. Having one for the cybersecurity organization will help the broader organization understand your purpose, values, and goals being delivered for the organization. This is something that can also be shared among other leaders within the organization and something that can be included in any presentations or materials being shared with the broader organization.

A simple cybersecurity mission and vision could look something like this:

Mission

Protect and secure the people, assets, and data at “your company” from the ongoing...

Change Management

One extremely important component that tends to be overlooked frequently is that of change management. Not just within the cybersecurity program, but the broader organization. We tend to find ourselves so busy with the need to move fast that change management is either rushed without thought or bypassed altogether. It is critical that you understand the importance of change management and its place as part of the overall organization and the cybersecurity program. Some benefits that come to mind with good change management include:

  • It ensures that testing has been completed, the change is documented, and backout plans are in place.
  • It provides an avenue to ensure communication is occurring across the broader organization.
  • It allows your support center to be better prepared.
  • It reduces risk by following a documented process with the correct controls in place.
  • It enforces changes to follow a schedule that everyone agrees to versus...

Summary

Ensuring you spend time to implement or review the current foundations in place will only set the program up for greater success. With the dynamics of cybersecurity constantly changing and evolving, you will want to have frequent reviews of the broader program to stay relevant. Being a cybersecurity leader today requires an understanding of the entire organization. You need to learn how to navigate the organization efficiently and build positive relationships throughout.

In addition, translating risk into business terms will only provide greater advantages as you collaborate more with the business. As with any leader, you will need to understand finances and how to manage them. Your program will continue to evolve and the need for funding will be an ongoing requirement as part of your role.

Laying the core building blocks for your cybersecurity program is something that must be completed by all cybersecurity leaders. Having this in place provides greater transparency...

Left arrow icon Right arrow icon

Key benefits

  • Gain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AI
  • Lay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturity
  • Equip yourself with the strategies needed to build and manage an effective cybersecurity program

Description

Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed today. This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses cybersecurity architecture, identity and access management, cybersecurity operations, vulnerability management, cybersecurity awareness, training, and testing, vendor risk management, and proactive services. It dives deep into managing Operational Technology (OT) & the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas. You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.

Who is this book for?

This book is geared towards the top leaders within an organization, C-level, CISO/CSO, directors, and program managers who build the strategy and execute the program. Cybersecurity managers, architects, engineers, administrators, analysts, and project managers who work in Cybersecurity would also benefit from this book. In addition, those who are still determining what they would like to do within cybersecurity can also benefit from this book by gaining an understanding of everything involved within a cybersecurity program. Basic knowledge of cybersecurity and its concepts will be helpful.

What you will learn

  • Build and define a cybersecurity program foundation
  • Discover the importance of why an architecture program is needed within cybersecurity
  • Learn the importance of Zero Trust Architecture
  • Learn what modern identity is and how to achieve it
  • Review of the importance of why a Governance program is needed
  • Build a comprehensive user awareness, training, and testing program for your users
  • Review the importance of why a GRC program is needed
  • Gain a thorough understanding of everything involved with regulatory and compliance

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Sep 27, 2024
Length: 752 pages
Edition : 1st
Language : English
ISBN-13 : 9781835462904
Vendor :
GitHub
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Sep 27, 2024
Length: 752 pages
Edition : 1st
Language : English
ISBN-13 : 9781835462904
Vendor :
GitHub
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
£16.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
£169.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts
£234.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total £ 101.97
IDS and IPS with Snort 3
£29.99
Pentesting APIs
£33.99
Resilient Cybersecurity
£37.99
Total £ 101.97 Stars icon

Table of Contents

18 Chapters
Current State Chevron down icon Chevron up icon
Setting the Foundations Chevron down icon Chevron up icon
Building Your Roadmap Chevron down icon Chevron up icon
Solidifying Your Strategy Chevron down icon Chevron up icon
Cybersecurity Architecture Chevron down icon Chevron up icon
Identity and Access Management Chevron down icon Chevron up icon
Cybersecurity Operations Chevron down icon Chevron up icon
Vulnerability Management Chevron down icon Chevron up icon
User Awareness, Training, and Testing Chevron down icon Chevron up icon
Vendor Risk Management Chevron down icon Chevron up icon
Proactive Services Chevron down icon Chevron up icon
Operational Technology and the Internet of Things Chevron down icon Chevron up icon
Governance Oversight Chevron down icon Chevron up icon
Managing Risk Chevron down icon Chevron up icon
Regulatory and Compliance Chevron down icon Chevron up icon
Some Final Thoughts Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(7 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




christopher Willey Oct 11, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Thanks to recent inclement weather, I was able to read Resilient Cybersecurity quicker than I anticipated. The writing style was clear and made for an easy read. The book was great for a person in the mid-career phase. The book excelled at identifying and contextualizing all the elements of a quality cyber program. I would estimate a third of the material I was up to date on, a third was material I had encountered before but needed a review of, and the final third was material I had to sit and think about. So, there was plenty to learn. My three biggest take aways were technology moves much faster than I realized, identifying my areas for improvement, and the role GRC plays in a quality cyber programAfter reading this book I realized just how difficult it is to stay up to date on all the latest trends and best practices. I knew ZTA was a topic of discussion, but I had no idea how mature the models had become. I knew identity was becoming the new cyber “border”, but I had no idea how advanced identity as a service had become (Microsoft Entra). In short, this book was a fantastic way to catch back up.Resilient Cybersecurity covered a wide array of topics. As each of these topics make up part of a cyber program, I found it helpful in identifying the areas I need additional work. For myself, it is clear I struggle with identity and access management, and cybersecurity operations (SOC) activities. The book gave enough details on both topics to help guide future investigation.Finally, GRC, an area I worked in for the last two years. I knew what GRC was coming into this, but there was still much to learn from this book. Without rewriting the book, I would simply say I was surprised at how well positioned the GRC team is to manage metrics and serve as the bridge to the executive leadership team.Thank you for the book and I look forward to your future work.
Amazon Verified review Amazon
Amazon Customer Oct 24, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book is a great resource for any IT professional. Mark is extremely knowledgeable and passionate about IT. This book serves well as a great reference point for those in the IT field, as well as those prepping for certification exams or wanting to expand their knowledge/expertise in IT. I cannot recommend this book enough!
Amazon Verified review Amazon
Byron Gorman Oct 30, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Resilient Cybersecurity is a Great Read, as you navigate through this book you will be enlightened with how to learn about the evolving and ever changing flow of cybersecurity.The books gives very detailed information on emerging threats and how to protect and mitigate them. Information on AI will fascinate you, and show the possibility of future use. There are example of data breaches that happened in the past to prepare you on how to handle them and eradicate them. If you had a Skill sets for a while, this book will inform you if they are outdated and the fact that you may have to change or upgrade your skills. It also shows you that some of the previous cyber security positions have either been merged or eliminated.New challenges have surfaced in the innovative hiring process that are addressed. Everything from building your own roadmap to create your own cyber security firm to user awareness,training and testing along with risk mitigation. This is one book that I found fascinating. A added jewel to your cybersecurity book library.
Amazon Verified review Amazon
Abhijit Remadevi Venugopal Oct 24, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Mark has been inspirational and delivering quality books on cybersecurity. Hugely beneficial for people like me trying to learn more and get more knowledge from the ocean of knowledge that is there in Cybersecurity. Thanks a lot for this.🤗
Amazon Verified review Amazon
Joanne Baca Oct 25, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Thorough, well-written and easy-to-understand playbook for approaching cybersecurity management including threat landscape, statistics, skills-gaps, and many other topics. A must for implementing cybersecurity.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.